Blog

A magnifying glass looking into a laptop conducting a digital forensic exercise using a first responder forensic toolkit A magnifying glass looking into a laptop conducting a digital forensic exercise using a first responder forensic toolkit

How Prepared is Your Organisation

13 September 2019

Time is of the essence if your organisation is under some form of cyberattack, particularly if you have not got the correct tools or expertise on standby. For many organisations, confirming they have an incident that warrants investigation or understanding the nature of an incident, is often not straightforward. Commonly they do not have ready acce…

Read More
variety of images depicting the use of devices, digital transformation, and business continuity variety of images depicting the use of devices, digital transformation, and business continuity

Know And Love Your Data

07 August 2019

Many organisations will make, or have made, significant investments into business transformation projects. Investing a modest percentage of the overall project spend into a cybersecurity improvement program could make the difference between having a trouble-free transition or not. The recipe to “bake in” security has become more complex over time,…

Read More
A monitor displaying the IT Policy Management as a Service offering A monitor displaying the IT Policy Management as a Service offering

IT Policy System Version 19 Released

17 July 2019

We are pleased to announce the release of IT Policy System Version 19 (Full Version) which ships as of August 1st. Find out the new additions and changes delivered in Version 19.

Read More
A team of the CEO, IT managers, and IT administrators working together to build a secure IT environment A team of the CEO, IT managers, and IT administrators working together to build a secure IT environment

Having Confidence in Cyber Security

03 July 2019

As an organisation goes through a technology transformation and increasingly adopts the use of the cloud it will work with new and existing suppliers to design and build systems. In doing so security ideally should be built or baked in to minimise the impact of a security incident in the future.

Read More

Contact Us Today

Fill in the form below or call us on +64 9 570 2233